Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Educational services, namely, providing classes, seminars and workshops in the field of robotic dental surgeries; training in the use and operation of surgical robots for dental surgery; Surgical instruments; surgical robots for dental surgery; dental instruments for surgery, scanning teeth in 3D, drilling teeth, milling fillings
IMPLANTABLE MEDICAL DEVICES, NAMELY, NEUROLOGICAL AND MUSCLE STIMULATORS AND RELATED CONTROL EQUIPMENT, NAMELY, RADIO FREQUENCY PROGRAMMING AND TELEMETRY DECODERS FOR USE THEREWITH
Optical, laser and machine vision sensors, cameras, detectors, computer hardware, and software for measuring 2D and 3D dimensions, surface roughness, texture, and spectral color; Sensors, detectors, computer hardware, and software for measuring or detecting environmental parameters in the nature of humidity, gas, airborne particles, vibration and temperature; Optical, laser and machine vision sensors, cameras, detectors, computer hardware, and software for solder paste inspection, and automated optical inspection of circuit board assemblies; Optical, laser and machine vision sensors, cameras, detectors, computer hardware, and software for dimensional metrology measurement and detection of objects, including contour, shape, thickness, waviness, warpage, angle, radius, diameter and height of such objects; Optical, laser and machine vision sensors, cameras, detectors, computer hardware, and software for control of electronic assembly manufacturing processes; Optical, laser and machine vision sensors, cameras, detectors, computer hardware, and software for detection and classification of object features; Optical, laser and machine vision sensors, cameras, computer hardware, and software for inspection of back-end semiconductor packaging; Optical, laser and machine vision sensors, cameras, computer hardware, and software for robotic guidance for the pick and placement of components on circuit board assemblies, ranging, collision avoidance, environment mapping and surgical assistance; Optical, laser and machine vision sensors, cameras, detectors, computer hardware, and software for reverse engineering, scanning and digitizing of objects; Sensors, detectors, computer hardware, and software that enables semiconductor tool setup and maintenance of the tool resulting in improved semiconductor manufacturing efficiencies, yields and quality; Sensors, cameras, detectors, computer hardware, and software for detecting and mapping the location of semiconductor wafers; and machine vision systems comprising sensors, computer hardware and software
Optical based measurement devices for use in ascertaining the surface features, contour, or shape of an object; optical sensors for high speed dimensional measurements of precision parts; optical sensors for assembling electronics; non-contact optical sensors for assembling electronics; solder paste inspection systems for inspecting and measuring solder paste on circuit boards and software therefor, namely, optical sensors, and associated computer hardware and software; non-contact inspection systems comprised of an optical sensor with a light source, lenses and optical detectors for three-dimensional measurement, used during the manufacturing process of precision parts; machine vision systems comprising component optical sensors and computer hardware and software; manufacturing devices, namely, optical sensors for use in component placement and inspection systems; optical wafer mapping sensors for detecting wafers in wafer processing systems
Optical based measurement devices for use in ascertaining the surface features, contour, or shape of an object; optical sensors for high speed dimensional measurements of precision parts; optical sensors for assembling electronics; non-contact optical sensors for assembling electronics; solder paste inspection systems for inspecting and measuring solder paste on circuit boards and software therefor, namely, optical sensors, and associated computer hardware and software; non-contact inspection systems comprised of an optical sensor with a light source, lenses and optical detectors for three-dimensional measurement, used during the manufacturing process of precision parts; machine vision systems comprising component optical sensors and computer hardware and software; manufacturing devices, namely, optical sensors for use in component placement and inspection systems; optical wafer mapping sensors for detecting wafers in wafer processing systems
On-line retail store services featuring apparel and edible mushrooms; Retail store services featuring apparel and edible mushrooms; Wholesale store services featuring apparel and edible mushrooms
Class 009: (based on intent to use) Downloadable software for ensuring the security of electronic mail; Downloadable application programming interface (API) software; Downloadable application programming interface (API) software for accessing identity threat intelligence and breached data records; Downloadable computer software for cybersecurity protection, namely, for detecting, analyzing, preventing cyber threats, monitoring compromised credentials, generating secure passwords, managing digital identities, and detecting data breaches.; Class 042: (based on use in commerce) Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Monitoring of computer systems to detect cybersecurity incidents; Computer programming consultancy; Software as a service (SAAS) services featuring software for cybersecurity monitoring, identity protection, breach detection, and digital risk analysis; Providing temporary use of on-line non-downloadable software and applications for aggregating, analyzing, and reporting on cyber threats, compromised credentials, and breach events; Platform as a service (PAAS) featuring computer software platforms for predictive cybersecurity analytics; managed cybersecurity and IT services, namely, threat monitoring, remediation, and incident response
Computer technology support services, namely, help desk services; Technical support, namely, monitoring technological functions of computer network systems; Technology advice provided to Internet users by means of a support hotline; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
Computer virus protection services; Computer security consultancy in the field of virus scanning software; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing temporary use of non-downloadable computer anti-virus software; Rental of humanoid robots with artificial intelligence; Rental of laboratory robots; Technical consulting in the field of monitoring technological functions of humanoid robots with artificial intelligence
Garments of outer clothing for men and women, namely shirts, blouses, jackets, trousers, jeans, skirts, sweaters, hats, scarves, pullovers, suits, dresses, jerseys, ties, and coats
Business marketing services, marketing advisory services, business marketing strategy development and business consulting services; brand imagery consulting services; brand concept and brand development services for corporate clients; providing marketing consulting in the field of social media, blogging, company branding, marketing content creation and website content; advertising and marketing services provided by means of indirect methods of marketing communications, namely, social media, search engine marketing, inquiry marketing, internet marketing, mobile marketing, blogging and other forms of passive, sharable or viral communications channels | Graphic design services; website design and development for others; creating and maintaining blogs for others
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.
Class 009: Computers; Personal computers; Portable computers; Electronic computers; Mobile computers; Desktop computers; Computer hardware; Computer peripherals and parts thereof; Downloadable computer game software; Downloadable video and computer game programs; Downloadable computer game instruction manuals; Computer game cartridges and discs; Handheld computers; Electronic circuit board; Printed circuit boards; Microprocessors; Computer keyboards; Computer mice; Computer monitors; Computer cables; Computer cases; Downloadable computer operating software; Downloadable computer software and firmware for operating system programs; Downloadable computer game programs
Cameras; Earphones; Headphones; Alarm monitoring systems; Batteries and battery chargers; Battery chargers; Data cables; USB cables; USB cables for cellphones; Video monitors
Computer security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT consulting services; Computer programming consultancy in the field of cybersecurity services, penetration testing, red teaming, and offensive research; Maintenance of computer software relating to computer security and prevention of computer risks; Technology consultation in the field of cybersecurity
Mechanical and electrical interconnect systems comprised of computer hardware and electronic cables for electronic signal transmission to be used with keyboards and displays
Class 009: Downloadable software development kits (SDK); Downloadable workflow management software; Downloadable computer software using artificial intelligence (AI) for developing automation AI agents using a chatbot to automatically develop the code for the requested AI agent that will handle automated desktop tasks.; Class 042: Design and development of artificial intelligence (AI) software; Design and development of intelligence (AI) software for AI-assisted development of automation AI agents for desktop tasks, using a chatbot to automatically develop the code for the requested AI agent; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for creating AI agents for automation of desktop tasks using a chatbot.
Class 009: Downloadable software development kits (SDK); Downloadable workflow management software; Downloadable software development tools for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Downloadable computer software platforms for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Downloadable computer software using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Downloadable computer programs using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Class 042: Design and development of artificial intelligence (AI) software; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Design and development of computer software for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Design and development of intelligence (AI) software for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data
Electronic blasting systems comprised of remote controlled wireless electronic transmitter and receiver devices and programmable electronic detonators used to detonate explosives; Electronic programmable blasting control devices and electronic blasting devices, namely, electronic controllers for detonators; downloadable computer software, namely, software for the use and operation of detonators or other instruments and tools used to ignite explosives or initiate explosive blasts and explosions | Electronic explosive blasting systems comprised of remote controlled wireless electronic delay detonators; devices initiating explosives, namely, detonators; Blasting systems for use in the blast hole comprised of blasting equipment in the nature of electronic delay detonators, detonator receiver antenna and booster unit, near field communication (NFC) programming tagger, transmitter antenna for transmitting electronic signals and blast control unit
3D scanners; Accumulators and batteries; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic roofing members; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic solar hybrid modules; Cameras; Cell phones; Computer hardware; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Photovoltaic cells and modules; Portable computers; Semi-conductors; Semiconductor chips; Semiconductor devices; Semiconductor testing apparatus; Semiconductor wafers
Incident response services, namely, consultancy for mitigating damage, in the nature of maintenance and repair of computer networks, from computer security breaches; Computer network security monitoring services, namely, monitoring computer systems and computer network systems for security purposes; Cybersecurity services, namely, restricting access to and by computer software and networks to and of undesired websites, media, software, individuals, facilities and malicious attackers; Incident response services, namely, technical support and consulting in the nature of diagnosing and investigating damage from computer security breaches; Malware analysis services, namely, technical support in the nature of remote and on-site troubleshooting for diagnosing intrusion incidents for computer hosts and computer network devices; software as a service (SaaS) for gathering threat intelligence designed to detect and defend against network security intrusions and investigate existing network security intrusions